rpc.pcnfsd Remote Format String Exploit

2010.07.21
Risk: High
Local: No
Remote: No
CWE: CWE-134


Ogólna skala CVSS: 10/10
Znaczenie: 10/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Pełny
Wpływ na integralność: Pełny
Wpływ na dostępność: Pełny

#Original Advisory: http://aluigi.org/adv/ut3steamer-adv.txt # ####################################################################### Luigi Auriemma Application: Unreal Tournament III http://www.unrealtournament3.com Versions: <= 2.1 (aka 3809) Platforms: Windows (tested) and Linux Bug: unitialized pointer Exploitation: remote, versus server Date: 17 Jul 2010 Author: Luigi Auriemma e-mail: aluigi@autistici.org web: aluigi.org ####################################################################### 1) Introduction 2) Bug 3) The Code 4) Fix ####################################################################### =============== 1) Introduction =============== Unreal Tournament III is currently the latest game (2007) of the Unreal series created by Epic Games (http://www.epicgames.com). ####################################################################### ====== 2) Bug ====== The game implements a particular command called STEAMBLOB which is handled in any case even if Steam is not running. This command accepts three arguments that are C, N and B and just this last one (doesn't matter what value it has) is the cause of a problem during the handling of some pointers that are left unitialized. The effect is the crash of the whole server due to the access to invalid memory or a NULL pointer. It's enough only one UDP packet to exploit the vulnerability so there are no limitations. ####################################################################### =========== 3) The Code =========== http://aluigi.org/fakep/unrealfp.zip http://www.exploit-db.com/sploits/unrealfp.zip unrealfp -x 2 -c "STEAMBLOB B=" SERVER PORT ####################################################################### ====== 4) Fix ====== No fix. #######################################################################

Referencje:

http://www.securityfocus.com/bid/40248
http://xforce.iss.net/xforce/xfdb/58718
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=5088
http://www.vupen.com/english/advisories/2010/1213
http://www.vupen.com/english/advisories/2010/1212
http://www.vupen.com/english/advisories/2010/1211
http://www.vupen.com/english/advisories/2010/1199
http://www.securitytracker.com/id?1023994
http://www.securityfocus.com/archive/1/archive/1/511405/100/0/threaded
http://www.ibm.com/support/docview.wss?uid=isg1IZ75465
http://www.ibm.com/support/docview.wss?uid=isg1IZ75440
http://www.ibm.com/support/docview.wss?uid=isg1IZ75369
http://www.ibm.com/support/docview.wss?uid=isg1IZ73874
http://www.ibm.com/support/docview.wss?uid=isg1IZ73757
http://www.ibm.com/support/docview.wss?uid=isg1IZ73681
http://www.ibm.com/support/docview.wss?uid=isg1IZ73599
http://www.ibm.com/support/docview.wss?uid=isg1IZ73590
http://www.checkpoint.com/defense/advisories/public/2010/cpai-13-May.html
http://securitytracker.com/id?1024016
http://secunia.com/advisories/39911
http://secunia.com/advisories/39835
http://osvdb.org/64729
http://marc.info/?l=bugtraq&m=127428077629933&w=2
http://marc.info/?l=bugtraq&m=127428077629933&w=2
http://aix.software.ibm.com/aix/efixes/security/pcnfsd_advisory.asc


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top